These are exciting times for the staff of Security Products and its related offerings. Today, we opened GovSec 2012 in Washington, D.C. Our keynotes were given by the director’s of cyber security and counterterrorism from the FBI: Ralph Boelter and John Snow.
- By Ralph C. Jensen
- Apr 03, 2012
Security Products magazine, the only integrated product magazine reaching the entire security market, announced Platinum and Gold winners in its 2012 Govies Government Security award competition today. The awards honor outstanding government products in a variety of categories.
SANS will be hosting a complimentary webcast on April 12, releasing the results to the First Annual Survey on Mobility Security.
New findings from a Tenable Network Security study have revealed that mobile device vulnerability management is a top concern for security professionals for the next 12 to 15 months
Scientists recently described development of a new explosives detector that can sense small amounts of TNT and other common explosives in liquids instantly with a sensitivity that rivals bomb-sniffing dogs, the current gold standard in protecting the public from terrorist bombs.
ASIS International (ASIS) is pleased to announce that Mohamed ElBaradei, former director general, International Atomic Energy Agency (IAEA), will address attendees of the ASIS International 58th Annual Seminar and Exhibits on Tuesday, September 11 at 8 a.m. at the Pennsylvania Convention Center in Philadelphia.
The concept behind fire-adapted communities is that with proper community-wide preparation, populations and infrastructure can withstand the devastating effects of wildland fire.
Surveillance data is critical in applications ranging from retail to government, and gaming to transportation. Today, video usage is moving beyond security and safety to other key business functions such as training, staffing, marketing and traffic flow. The strategic value of video data is made possible because of advancements in IP-based megapixel cameras and the intelligence of incoming video streams, which are increasingly tagged with information to improve search capabilities. But the influx in high-resolution video data combined with the greater amount of VMS features creates a significant performance challenge for video surveillance storage systems, which are the core of any surveillance deployment. Flash memory is a compelling new high-performance storage technology, but the price premium over disk drives is so large that it takes some creative thinking to make flash costeffective for mainstream surveillance environments.
- By Lee Caswell
- Apr 01, 2012
Cell towers and accompanying cell sites attract more attention in the area of security than ever before.
- By Rolland Trayte
- Apr 01, 2012
Its deputies in the field were being asked to make do with an old, end-of-life mobile data terminal (MDT) system that it had been using for more than two decades.
- By TJ Kennedy
- Apr 01, 2012
Integration of multifaceted security systems can be a serious challenge. Using cameras, call boxes, mass notification systems and access control readers together is a difficult but increasingly common goal.
- By Samuel Shanes
- Apr 01, 2012
Susceptibility to an attack begins with an unprotected perimeter. In the past, an unprotected perimeter often meant the opportunity for myriad security breaches, loss of assets and the chance for loss of human life.
- By Patricia Logue
- Apr 01, 2012
Both physical security and IT professionals place great importance on cyber security.
- By Steve Surfaro
- Apr 01, 2012
Emergency preparedness requires critical communications to be response ready—help can’t wait when disaster strikes.
- By Ben Bradley
- Apr 01, 2012
The town of Oyster Bay, part of the New York metropolitan area, is the only town in Nassau County that extends from the North Shore to the South Shore of Long Island.
- By Samuel Shanes
- Apr 01, 2012
Hosted video has leveled the playing field for many small businesses looking to secure their properties with the latest network surveillance technology.
- By Matt Krebs
- Apr 01, 2012
Surveillance data is critical in applications ranging from retail to government, and gaming to transportation.
- By Lee Caswell
- Apr 01, 2012
When selecting a partner for your government security program, it’s important to keep in mind the four C’s that lead to success: commitment, compliance, coverage and communication.
- By Dan Myslewski
- Apr 01, 2012